638 research outputs found

    Optimal Privacy-Aware Dynamic Estimation

    Full text link
    In this paper, we develop an information-theoretic framework for the optimal privacy-aware estimation of the states of a (linear or nonlinear) system. In our setup, a private process, modeled as a first-order Markov chain, derives the states of the system, and the state estimates are shared with an untrusted party who might attempt to infer the private process based on the state estimates. As the privacy metric, we use the mutual information between the private process and the state estimates. We first show that the privacy-aware estimation is a closed-loop control problem wherein the estimator controls the belief of the adversary about the private process. We also derive the Bellman optimality principle for the optimal privacy-aware estimation problem, which is used to study the structural properties of the optimal estimator. We next develop a policy gradient algorithm, for computing an optimal estimation policy, based on a novel variational formulation of the mutual information. We finally study the performance of the optimal estimator in a building automation application

    Finite Horizon Privacy of Stochastic Dynamical Systems:A Synthesis Framework for Dependent Gaussian Mechanisms

    Get PDF
    We address the problem of synthesizing distorting mechanisms that maximize privacy of stochastic dynamical systems. Information about the system state is obtained through sensor measurements. This data is transmitted to a remote station through an unsecured/public communication network. We aim to keep part of the system state private (a private output); however, because the network is unsecured, adversaries might access sensor data and input signals, which can be used to estimate private outputs. To prevent an accurate estimation, we pass sensor data and input signals through a distorting (privacy-preserving) mechanism before transmission, and send the distorted data to the trusted user. These mechanisms consist of a coordinate transformation and additive dependent Gaussian vectors. We formulate the synthesis of the distorting mechanisms as a convex program, where we minimize the mutual information (our privacy metric) between an arbitrarily large sequence of private outputs and the disclosed distorted data for desired distortion levels -- how different actual and distorted data are allowed to be

    The Impact of Interference on GNSS Receiver Observables – A Running Digital Sum Based Simple Jammer Detector

    Get PDF
    A GNSS-based navigation system relies on externally received information via a space-based Radio Frequency (RF) link. This poses susceptibility to RF Interference (RFI) and may initiate failure states ranging from degraded navigation accuracy to a complete signal loss condition. To guarantee the integrity of the received GNSS signal, the receiver should either be able to function in the presence of RFI without generating misleading information (i.e., offering a navigation solution within an accuracy limit), or the receiver must detect RFI so that some other means could be used as a countermeasure in order to ensure robust and accurate navigation. Therefore, it is of utmost importance to identify an interference occurrence and not to confuse it with other signal conditions, for example, indoor or deep urban canyon, both of which have somewhat similar impact on the navigation performance. Hence, in this paper, the objective is to investigate the effect of interference on different GNSS receiver observables in two different environments: i. an interference scenario with an inexpensive car jammer, and ii. an outdoor-indoor scenario without any intentional interference. The investigated observables include the Automatic Gain Control (AGC) measurements, the digitized IF (Intermediate Frequency) signal levels, the Delay Locked Loop and the Phase Locked Loop discriminator variances, and the Carrier-to-noise density ratio (C/N0) measurements. The behavioral pattern of these receiver observables is perceived in these two different scenarios in order to comprehend which of those observables would be able to separate an interference situation from an indoor scenario, since in both the cases, the resulting positioning accuracy and/or availability are affected somewhat similarly. A new Running Digital Sum (RDS) -based interference detection method is also proposed herein that can be used as an alternate to AGC-based interference detection. It is shown in this paper that it is not at all wise to consider certain receiver observables for interference detection (i.e., C/N0); rather it is beneficial to utilize certain specific observables, such as the RDS of raw digitized signal levels or the AGC-based observables that can uniquely identify a critical malicious interference occurrence

    Sparse Signal Processing Concepts for Efficient 5G System Design

    Full text link
    As it becomes increasingly apparent that 4G will not be able to meet the emerging demands of future mobile communication systems, the question what could make up a 5G system, what are the crucial challenges and what are the key drivers is part of intensive, ongoing discussions. Partly due to the advent of compressive sensing, methods that can optimally exploit sparsity in signals have received tremendous attention in recent years. In this paper we will describe a variety of scenarios in which signal sparsity arises naturally in 5G wireless systems. Signal sparsity and the associated rich collection of tools and algorithms will thus be a viable source for innovation in 5G wireless system design. We will discribe applications of this sparse signal processing paradigm in MIMO random access, cloud radio access networks, compressive channel-source network coding, and embedded security. We will also emphasize important open problem that may arise in 5G system design, for which sparsity will potentially play a key role in their solution.Comment: 18 pages, 5 figures, accepted for publication in IEEE Acces

    Doctor of Philosophy

    Get PDF
    dissertationCross layer system design represents a paradigm shift that breaks the traditional layer-boundaries in a network stack to enhance a wireless network in a number of di erent ways. Existing work has used the cross layer approach to optimize a wireless network in terms of packet scheduling, error correction, multimedia quality, power consumption, selection of modulation/coding and user experience, etc. We explore the use of new cross layer opportunities to achieve secrecy and e ciency of data transmission in wireless networks. In the rst part of this dissertation, we build secret key establishment methods for private communication between wireless devices using the spatio-temporal variations of symmetric-wireless channel measurements. We evaluate our methods on a variety of wireless devices, including laptops, telosB sensor nodes, and Android smartphones, with diverse wireless capabilities. We perform extensive measurements in real-world environments and show that our methods generate high entropy secret bits at a signi cantly faster rate in comparison to existing approaches. While the rst part of this dissertation focuses on achieving secrecy in wireless networks, the second part of this dissertation examines the use of special pulse shaping lters of the lterbank multicarrier (FBMC) physical layer in reliably transmitting data packets at a very high rate. We rst analyze the mutual interference power across subcarriers used by di erent transmitters. Next, to understand the impact of FBMC beyond the physical layer, we devise a distributed and adaptive medium access control protocol that coordinates data packet tra c among the di erent nodes in the network in a best e ort manner. Using extensive simulations, we show that FBMC consistently achieves an order-of-magnitude performance improvement over orthogonal frequency division multiplexing (OFDM) in several aspects, including packet transmission delays, channel access delays, and e ective data transmission rate available to each node in static indoor settings as well as in vehicular networks
    • …
    corecore